SAF-T Framework Transaction SAFTN_G allows an attacker to exploit insufficient validation of path information provided by normal user, leading to full server directory access. The attacker can see the whole filesystem structure but cannot overwrite, delete, or corrupt arbitrary files on the server.
References
Link | Resource |
---|---|
https://launchpad.support.sap.com/#/notes/3124094 | Vendor Advisory |
https://wiki.scn.sap.com/wiki/display/PSR/SAP+Security+Patch+Day+-+December+2021 | Permissions Required Vendor Advisory |
Configurations
Configuration 1 (hide)
|
History
No history.
Information
Published : 2021-12-14 16:15
Updated : 2024-02-28 18:48
NVD link : CVE-2021-44232
Mitre link : CVE-2021-44232
CVE.ORG link : CVE-2021-44232
JSON object : View
Products Affected
sap
- saf-t_framework
CWE
CWE-22
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')